CN105933271A - Data processing method and apparatus based on encoder - Google Patents

Data processing method and apparatus based on encoder Download PDF

Info

Publication number
CN105933271A
CN105933271A CN201511016898.2A CN201511016898A CN105933271A CN 105933271 A CN105933271 A CN 105933271A CN 201511016898 A CN201511016898 A CN 201511016898A CN 105933271 A CN105933271 A CN 105933271A
Authority
CN
China
Prior art keywords
application
encryption equipment
encryption
equipment
application server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511016898.2A
Other languages
Chinese (zh)
Other versions
CN105933271B (en
Inventor
刘维博
卢凯
郭延斌
冀乃庚
尹亚伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201511016898.2A priority Critical patent/CN105933271B/en
Publication of CN105933271A publication Critical patent/CN105933271A/en
Application granted granted Critical
Publication of CN105933271B publication Critical patent/CN105933271B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms

Abstract

The invention relates to the technical field of communication and discloses a data processing method and apparatus based on an encoder. The data processing method includes that an application server sends the data to be processed of a first application to an encoder of the first application; if the application server doesn't receive the correct response message replied by the encoder of the first application within the first preset time, the application server sends the data to be processed of the first application to an encoder of a second application. According to the invention, the problems of redundancy and waste of encoder resources in the prior art can be solved.

Description

A kind of data processing method based on encryption equipment and device
Technical field
The present invention relates to communication technical field, particularly relate to a kind of data processing method based on encryption equipment and dress Put.
Background technology
At present, along with the becoming increasingly abundant of class of business of the increasingly extensive of network application and different field, borrow Encryption equipment is helped to carry out safety information (i.e. higher to security requirement information, such as fiscard password etc.) Become more and more important alternately.
Encryption equipment is a kind of external equipment realizing main frame encryption, for protection or discriminating, the key pipe of message The aspects such as reason, message integrity control, are one of the key equipments of business procession, are widely used in silver In the information network of multiple industries such as row, telecommunications, social security, traffic.When encryption equipment fault, communication abnormality, Or the reason such as encryption equipment edition upgrading is when causing encryption equipment to shut down or be unavailable, will cause at main frame applied business Reason is interrupted.
In prior art, on the basis of each service application connects a primary encryption equipment, additionally arrange one The encryption equipment that platform is standby, cannot connect primary encryption equipment etc. no if occurring primary encryption equipment to break down maybe During situation about can use, it is switched to use standby encryption equipment to process business.So, the most standby Encryption equipment be not involved in Business Processing, there is encryption equipment redundancy issue, cause the idle waste of resource.
Summary of the invention
The embodiment of the present invention provides a kind of data processing method based on encryption equipment and device, existing in order to solve The problem of encryption equipment resource redundancy waste in technology.
The data processing method based on encryption equipment that the embodiment of the present invention provides includes:
Application server sends the pending data of described first application to the encryption equipment of the first application;
If the encryption equipment that described application server does not receives described first application in the first Preset Time returns Multiple correct response message, the most described application server sends described first application to the encryption equipment of the second application Pending data.
Optionally, described application server sends the pending of described first application to the encryption equipment of the second application Data, including:
Described application server selects an encryption equipment, wherein, one from the encryption equipment of multiple second application The second corresponding encryption equipment of application;
What the encryption equipment transmission described first that described application server is applied to second selected was applied waits to locate Reason data.
Optionally, described application server selects an encryption equipment, bag from the encryption equipment of multiple second application Include:
The encryption equipment of multiple second application is carried out prioritization by described application server;
Described application server selects the encryption equipment of the second application that priority is the highest.
Optionally, described application server does not receives the encryption of described first application in the first Preset Time The correct response message that machine is replied, including:
Described application server does not receives the encryption equipment of described first application in described first Preset Time Response message;Or
Described application server receives the encryption equipment of described first application in described first Preset Time and sends out The error message sent.
Optionally, described application server sends the pending of described first application to the encryption equipment of the second application After data, also include:
Described application server judges whether to arrive the second Preset Time, the most then to described first application Encryption equipment sends the pending data of described first application;
Otherwise, continue to send the follow-up pending number of described first application to the encryption equipment of described second application According to.
A kind of data processing equipment based on encryption equipment, including:
The direct-connected module of encryption equipment, for sending the pending number of described first application to the encryption equipment of the first application According to;
Encryption equipment proxy module, if not receiving in the first Preset Time for the direct-connected module of described encryption equipment The correct response message that the encryption equipment of described first application is replied, then the encryption equipment to the second application sends described The pending data of the first application.
Optionally, described encryption equipment proxy module, specifically for:
An encryption equipment, wherein, one second application corresponding is selected from the encryption equipment of multiple second application Individual encryption equipment;
Encryption equipment to described second application selected sends the pending data of described first application.
Optionally, described encryption equipment proxy module, specifically for:
The encryption equipment of multiple second application is carried out prioritization;
Select the encryption equipment of the second application that priority is the highest.
Optionally, described encryption equipment proxy module, specifically for:
If the direct-connected module of described encryption equipment does not receives described first application in described first Preset Time The response message of encryption equipment;Or
The direct-connected module of described encryption equipment receives the encryption of described first application in described first Preset Time The error message that machine sends,
Then the encryption equipment to described second application sends the pending data of described first application.
Optionally, described encryption equipment proxy module is additionally operable to:
After the encryption equipment of the second application sends the pending data of described first application, it may be judged whether arrive Second Preset Time, the most then the encryption equipment to described first application sends the pending of described first application Data;
Otherwise, continue to send the pending number of follow-up described first application to the encryption equipment of described second application According to.
In the embodiment of the present invention, the first application has pending data to need encryption equipment to process, first should to first Pending data are sent with direct-connected encryption equipment.After the encryption equipment determining the first application is unavailable, application clothes The pending data that first applies are sent to the encryption equipment of the second application by business device, and the encryption equipment of the second application is i.e. For the encryption equipment direct-connected with the second application.It is to say, using the second encryption equipment applied as the first application Spare cryptographic machine, it is not necessary to encryption equipment is additionally set as spare cryptographic machine.Thus, eliminate increase standby to add Close machine, saves encryption equipment resource.It addition, the encryption equipment of the second application is as the primary encryption of the second application Machine, in the case of the encryption equipment of the first application normally uses, the most normally works, it is to avoid there is idle add The situation of close machine, makes full use of existing encryption equipment resource, improves resource utilization, it is achieved that encryption equipment The high availability of resource.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below The accompanying drawing used is needed to briefly introduce, it should be apparent that, the accompanying drawing in describing below is only the present invention's Some embodiments, from the point of view of those of ordinary skill in the art, in the premise not paying creative work Under, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is application and the connection diagram of encryption equipment in prior art;
Fig. 2 is the flow chart of data processing method based on encryption equipment in the embodiment of the present invention;
Fig. 3 is the connection diagram of application, encryption equipment proxy module and encryption equipment in the embodiment of the present invention;
Fig. 4 is the connection diagram of a kind of application in the embodiment of the present invention, encryption equipment proxy module and encryption equipment;
Fig. 5 is the flow chart of a kind of data processing method based on encryption equipment in the embodiment of the present invention;
Fig. 6 is the connection signal of another kind of application, encryption equipment proxy module and encryption equipment in the embodiment of the present invention Figure;
Fig. 7 is the schematic diagram of data processing equipment based on encryption equipment in the embodiment of the present invention.
Detailed description of the invention
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to this Bright it is described in further detail, it is clear that described embodiment is only some embodiments of the present invention, Rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out all other embodiments obtained under creative work premise, broadly fall into the scope of protection of the invention.
The external encryption device that encryption equipment is attached on main frame, and between main frame, use TCP/IP (transmission control Agreement/Internet Protocol processed, Transmission Control Protocol/Internet Protocol) communication. Can include multiple application of process business in main frame i.e. application server, each application configuration one is primary Encryption equipment.When application has data message to need to carry out the process such as encryption and decryption, it would be desirable to the data of process send To encryption equipment.If the encryption equipment of certain application breaks down, the data message of this application will be unable to process, Can cause whole flow chart of data processing that terminal occurs, affect the use of user.Prior art additionally arranges one Individual spare cryptographic machine, as shown in Figure 1.Each application is connected except the encryption equipment with this application, is also connected with standby Use encryption equipment.When primary encryption equipment is unavailable, the data of this application are sent to standby by application server Encryption equipment processes.Data processing method of the prior art can cause the redundancy of encryption equipment resource to waste.
In order to solve the problems referred to above, embodiments provide a kind of data process side based on encryption equipment Method, the flow process of the method is as in figure 2 it is shown, method may include steps of:
S101, application server send the pending data of described first application to the encryption equipment of the first application;
If the described application server of S102 does not receives the encryption of described first application in the first Preset Time The correct response message that machine is replied, the most described application server sends described first to the encryption equipment of the second application The pending data of application.
In the embodiment of the present invention, the first application has pending data to need encryption equipment to process, first should to first Pending data are sent with direct-connected encryption equipment.After the encryption equipment determining the first application is unavailable, application clothes The pending data that first applies are sent to the encryption equipment of the second application by business device, and the encryption equipment of the second application is i.e. For the encryption equipment direct-connected with the second application.It is to say, using the second encryption equipment applied as the first application Spare cryptographic machine, it is not necessary to encryption equipment is additionally set as spare cryptographic machine.Thus, eliminate increase standby to add Close machine, saves encryption equipment resource.It addition, the encryption equipment of the second application is as the primary encryption of the second application Machine, in the case of the encryption equipment of the first application normally uses, the most normally works, it is to avoid there is idle add The situation of close machine, makes full use of existing encryption equipment resource, improves resource utilization, it is achieved that encryption equipment The high availability of resource.
Above-mentioned second application can be multiple second application, i.e. there is multiple application in application server and processes industry Business, using one of them application as the first application, remaining is the second application.Therefore, above-mentioned steps S101 Including:
Described application server selects an encryption equipment, wherein, one from the encryption equipment of multiple second application The second corresponding encryption equipment of application;
What the encryption equipment transmission described first that described application server is applied to second selected was applied waits to locate Reason data.
Specifically, application server includes multiple application, the corresponding primary encryption equipment of each application, This primary encryption equipment is joined directly together, when application has data to need encryption equipment to process with corresponding application Time, first send the data to direct-connected primary encryption equipment.It addition, set up encryption equipment in the application server Proxy module, this module one end is connected with each application in application server, and the other end connects application service Each encryption equipment outside device, as shown in Figure 3.When the encryption equipment that certain application is corresponding is unavailable, this application Data to be processed need to be sent to encryption equipment proxy module, encryption equipment proxy module is from remaining application correspondence Encryption equipment in select an encryption equipment, the encryption equipment sending the data to choose processes.
In prior art, if the direct-connected multiple primary encryption equipment of main frame is the most unavailable, all disabled masters All switch to spare cryptographic machine by the business of encryption equipment process, will result in standby encryption equipment overload.This In inventive embodiments, if there being multiple disabled primary encryption equipment, then business can be shared to multiple spare cryptographic Machine processes, has equalized the load of encryption equipment, prevent single encryption equipment overload.
In prior art, another way is all application not to be directly connected to encryption equipment, by encryption equipment generation Reason module is connected to multiple encryption equipment, when application needs to send to encryption equipment pending data, first will Pending data send to encryption equipment proxy module, encryption equipment proxy module select from all encryption equipments One, pending data are sent to the encryption equipment chosen.There is higher risk in this mode, if encryption Machine proxy module is abnormal, and all encryption equipments will be caused the most unavailable, and Business Processing stops.The embodiment of the present invention In, apply direct-connected primary encryption equipment, utilize encryption equipment proxy module to manage spare cryptographic machine, normal condition Lower utilizing primary encryption equipment to process data, primary encryption equipment breaks down to switch to and utilizes spare cryptographic machine Processing, the most primary encryption equipment and standby encryption equipment all break down just can be to the flow process of Business Processing Produce impact, therefore, shared failure risk, improve the high availability of encryption equipment.
It should be noted that in the embodiment of the present invention first application, second application be for convenience understand and Statement, and non restrictive description.Arbitrary application in application server all can be as the first application, it is possible to makees It it is the second application.When certain application in application server is as the first application, relative to this first application Speech, remaining application is the second application.When another application as first application time, upper one as first The application of application is then the second application.This is not limited by the embodiment of the present invention.
In the embodiment of the present invention, when the encryption equipment of the first application is unavailable, switch to the encryption of the second application Machine processes, and wherein, the encryption equipment of the first application is unavailable shows that application server is in the first Preset Time Do not receive the correct response message that the encryption equipment of described first application is replied, including:
Described application server does not receives the encryption equipment of described first application in described first Preset Time The message sent;Or
Described application server receives the encryption equipment of described first application in described first Preset Time Response message.
Specifically, encryption equipment is unavailable includes multiple situation, as encryption equipment self breaks down, applies clothes Connecting between business device and encryption equipment be abnormal, mutual abnormal etc. between application server and encryption equipment.Specifically Show that application server, after encryption equipment sends data message, does not receives encryption equipment in the first Preset Time The message replied, then it is assumed that the encryption equipment of the first application is unavailable.Or, application server is preset first Receive the message that encryption equipment is replied in time, but the message of this reply sends to encryption equipment with application server Message the most corresponding, as error messages such as mess codes, after application server receives the message that encryption equipment is replied, Judge that the message replied is error message, be then also considered as application server and do not receive in the first Preset Time The correct response message that encryption equipment is replied, the encryption equipment of the i.e. first application is unavailable.
After judging that the first encryption equipment applied is unavailable, will the first pending data applied send to adding Close machine proxy module, is selected one to process the by encryption equipment proxy module in the encryption equipment of multiple second application The pending data of one application.Specifically chosen mode can be to randomly choose, and i.e. encryption equipment proxy module is The encryption equipment of two application randomly chooses an encryption equipment, is sent to pending data.If this second application Encryption equipment can use, in follow-up a period of time, first application pending data all issue this second should Encryption equipment process.If this second application encryption equipment unavailable, then continue from remaining second should Encryption equipment in randomly choose one, send pending data, until randomly choose second application add Close machine can be used.Wherein judge the second encryption equipment applied whether can method can apply with above-mentioned judgement first Encryption equipment whether can method identical.
It is preferred that select the mode of the encryption equipment of the second application to be carried out preferentially by the encryption equipment that second applies Level sequence, i.e. application server select an encryption equipment from the encryption equipment of multiple second application, including:
The encryption equipment of multiple second application is carried out prioritization by described application server;
Described application server selects the encryption equipment of the second application that priority is the highest.
Specifically, can carry out excellent based on the one or more encryption equipments to the second application in following key element First level sequence: encryption equipment feature list, line status, functional status, average response time, call the frequency. Wherein, on the premise of the encryption equipment of the second application can connect and line status and functional status are all normal, can The encryption equipment of the second application is carried out with calling the frequency according to the average response time of the encryption equipment of the second application Prioritization.
Such as, first application server according to the load of encryption equipment, selects negative from the encryption equipment of the second application Carry minimum one or more encryption equipments;Then, from the one or more encryption equipments selected, select further Go out the encryption equipment that Business Processing is the fastest.The priority of encryption equipment based on the second application, first to priority High encryption equipment sends the pending data of the first application, if the encryption equipment successful execution that this priority is the highest Process task, in follow-up a period of time, continues the pending data by first applies and is sent to this priority The highest encryption equipment;If the encryption equipment that priority is the highest can not perform process task, then according to priority orders Select the encryption equipment of next priority, be sent to pending data, until pending data are successfully processed.
For another example, in application server, include applying 1~7, connect 7 encryption equipments, wherein encryption equipment 2,4 Break down with 5.When encryption equipment 2 breaks down, application server is first according to the function shape of encryption equipment Remaining 6 encryption equipment is carried out prioritization by state and average response time, and after sequence, encryption equipment 3 is excellent First level is the highest, then the data of encryption equipment 2 are sent to encryption equipment 3 and process by application server.Add afterwards Close machine 4 breaks down, and owing to encryption equipment 2 also breaks down, is then entered by encryption equipment 1,3,5,6 and 7 Row major level sorts.It should be noted that encryption equipment 3 has processed the pending data of application 2, here Encryption equipment 3 can be re-started prioritization, it is possible to foreclosed by encryption equipment 3, only from encryption equipment 1, selecting in 5,6 and 7, this is only for example by the embodiment of the present invention, does not limits.From 5 encryption equipments In select the highest encryption equipment of priority 5, for process application 4 data.Followed by, encryption equipment 5 Break down, then from encryption equipment 1,3,6 and 7, select the highest encryption equipment of priority 7.Owing to adding Close machine 5 is processing application 4 and the pending data of application 5 before breaking down, then will application 4 and application 5 Pending data be sent to encryption equipment 7.
In the embodiment of the present invention, encryption equipment is carried out prioritization and sorts for real-time, i.e. encrypt according to certain When machine breaks down, the state that remaining encryption equipment is current, remaining encryption equipment is ranked up.Add when next time has When close machine breaks down, then re-start prioritization.This is because at the performance of encryption equipment and encryption equipment The pending data of the application of reason are relevant, and the data that each time period encryption equipment processes are different, the number of process Also different according to amount, therefore the disposal ability of encryption equipment can change, and when switching is called, need to carry out real-time priority Sequence.
Encryption equipment can recover normal by the mode such as self-starting, self-shield, above-mentioned by first apply pending Data send to second application encryption equipment process after, after a period of time, then by first apply wait locate Reason data send the encryption equipment to the first application.That is, application server sends institute to the encryption equipment of the second application After stating the pending data of the first application, including:
Described application server judges whether to arrive the second Preset Time, the most then continuing should to described first Encryption equipment send described first application follow-up pending data;
Otherwise, the encryption equipment to described second application sends the pending data of described first application.
Specifically, application server is from the pending data sending the first application to the encryption equipment of the second application Start timing, after arriving the second Preset Time, automatically switch back into the encryption equipment connecting the first application, will The pending data of the first application are sent to the encryption equipment of the first application.If the encryption equipment of the first application can be used, Then the encryption equipment of place's reason first application of follow-up data performs.If the encryption equipment of the first application is the most unavailable, Then the pending data after the first application will be sent to the encryption equipment of the second application and process, and recalculate Time.In prior art, after business is switched to the process of spare cryptographic machine, it is impossible to switchback adds to the most direct-connected automatically Close machine, needs manual intervention.So, when when direct-connected encryption equipment recovers normal, spare cryptographic machine breaks down, Automatically business cannot be switched back into direct-connected encryption equipment, Business Processing will be affected, lack robustness.And the present invention In embodiment, the switching of encryption equipment, without manual intervention, can realize automatic switchover and recovery that encryption equipment calls, Thus ensure that processing procedure is not interrupted, improve high availability and the robustness of encryption equipment.
In order to be more clearly understood that the present invention, with instantiation, above-mentioned flow process is described in detail below.
In a kind of embodiment of the present invention, as shown in Figure 4, have in application server application A, B, C and D, and encryption equipment proxy module.Four application are connected respectively encryption equipment a, b, c and d, encryption One end of machine proxy module connects four application, and one end connects four encryption equipments.In embodiment, application service The pending data of business B of device need to be encrypted operation, and concrete steps are as it is shown in figure 5, include:
The pending data of business B are sent to encryption equipment b by the direct-connected module of S201, encryption equipment.
The direct-connected module of S202, encryption equipment judges whether receive what encryption equipment b sent in the first Preset Time Correctly reply message, if so, perform step S201;Otherwise, step S203 is performed.
The encryption that the pending data of business B are sent in application server by the direct-connected module of S203, encryption equipment Machine proxy module.
After S204, encryption equipment proxy module receive the pending data of business B, by encryption equipment a, c and D carries out prioritization.
S205, encryption equipment proxy module, according to priority orders, select one from encryption equipment a, c and d Available encryption equipment, sends the pending data of business B, and starts timing.
S206, encryption equipment proxy module judge whether to arrive the second Preset Time, the most then perform step S201;Otherwise, step S203 is performed.
Above-described embodiment is the switching being encrypted machine in an application server.It is preferred that the present invention is real Execute example and can also be encrypted the switching of machine between multiple application servers.Such as, as shown in Figure 6, four Individual application server J, K, L and M, connect encryption equipment j, k, l and m of correspondence, each application respectively Server includes application and an encryption equipment proxy module.Each application is directly connected to an encryption equipment, and By the encryption equipment proxy module in same application server, it is indirectly connected to other encryption equipment applied.
During it should be noted that be encrypted the switching of machine between multiple application servers, application clothes In business device, an application can be comprised, it is also possible to comprising multiple application, this is only shown by the embodiment of the present invention Example, does not limits.
Based on identical technology design, the embodiment of the present invention also provides for data processing equipment based on encryption equipment, As it is shown in fig. 7, comprises:
The direct-connected module of encryption equipment 11, for sending the pending of described first application to the encryption equipment of the first application Data;
Encryption equipment proxy module 12, if not receiving in the first Preset Time for the direct-connected module of described encryption equipment The correct response message replied to the encryption equipment of described first application, then the encryption equipment to the second application sends institute State the pending data of the first application.
Optionally, encryption equipment proxy module 12, specifically for:
An encryption equipment, wherein, one second application corresponding is selected from the encryption equipment of multiple second application Individual encryption equipment;
Encryption equipment to described second application selected sends the pending data of described first application.
Optionally, encryption equipment proxy module 12, specifically for:
The encryption equipment of multiple second application is carried out prioritization;
Select the encryption equipment of the second application that priority is the highest.
Optionally, encryption equipment proxy module 12, specifically for:
If the direct-connected module of encryption equipment 11 does not receives adding of described first application in described first Preset Time The response message of close machine;Or
The direct-connected module of encryption equipment 11 receives the encryption equipment of described first application in described first Preset Time The error message sent,
Then the encryption equipment to described second application sends the pending data of described first application.
Optionally, encryption equipment proxy module 12 is additionally operable to:
After the encryption equipment of the second application sends the pending data of described first application, it may be judged whether arrive Second Preset Time, the most then the encryption equipment to described first application sends the pending of described first application Data;
Otherwise, continue to send the pending number of follow-up described first application to the encryption equipment of described second application According to.
The present invention is with reference to method, equipment (system) and computer program product according to embodiments of the present invention The flow chart of product and/or block diagram describe.It should be understood that can by computer program instructions flowchart and / or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedding The processor of formula datatron or other programmable data processing device is to produce a machine so that by calculating The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.

Claims (10)

1. a data processing method based on encryption equipment, it is characterised in that including:
Application server sends the pending data of described first application to the encryption equipment of the first application;
If the encryption equipment that described application server does not receives described first application in the first Preset Time returns Multiple correct response message, the most described application server sends described first application to the encryption equipment of the second application Pending data.
2. the method for claim 1, it is characterised in that described application server is to the second application Encryption equipment send described first application pending data, including:
Described application server selects an encryption equipment, wherein, one from the encryption equipment of multiple second application The second corresponding encryption equipment of application;
What the encryption equipment transmission described first that described application server is applied to second selected was applied waits to locate Reason data.
3. method as claimed in claim 2, it is characterised in that described application server is from multiple second The encryption equipment of application selects an encryption equipment, including:
The encryption equipment of multiple second application is carried out prioritization by described application server;
Described application server selects the encryption equipment of the second application that priority is the highest.
4. the method for claim 1, it is characterised in that described application server is preset first The correct response message that the encryption equipment of described first application is replied is not received in time, including:
Described application server does not receives the encryption equipment of described first application in described first Preset Time Response message;Or
Described application server receives the encryption equipment of described first application in described first Preset Time and sends out The error message sent.
5. the method for claim 1, it is characterised in that described application server is to the second application Encryption equipment send described first application pending data after, also include:
Described application server judges whether to arrive the second Preset Time, the most then to described first application Encryption equipment sends the pending data of described first application;
Otherwise, continue to send the follow-up pending number of described first application to the encryption equipment of described second application According to.
6. a data processing equipment based on encryption equipment, it is characterised in that including:
The direct-connected module of encryption equipment, for sending the pending number of described first application to the encryption equipment of the first application According to;
Encryption equipment proxy module, if not receiving in the first Preset Time for the direct-connected module of described encryption equipment The correct response message that the encryption equipment of described first application is replied, then the encryption equipment to the second application sends described The pending data of the first application.
7. device as claimed in claim 6, it is characterised in that described encryption equipment proxy module, specifically For:
An encryption equipment, wherein, one second application corresponding is selected from the encryption equipment of multiple second application Individual encryption equipment;
Encryption equipment to described second application selected sends the pending data of described first application.
8. device as claimed in claim 7, it is characterised in that described encryption equipment proxy module, specifically For:
The encryption equipment of multiple second application is carried out prioritization;
Select the encryption equipment of the second application that priority is the highest.
9. device as claimed in claim 6, it is characterised in that described encryption equipment proxy module, specifically For:
If the direct-connected module of described encryption equipment does not receives described first application in described first Preset Time The response message of encryption equipment;Or
The direct-connected module of described encryption equipment receives the encryption of described first application in described first Preset Time The error message that machine sends,
Then the encryption equipment to described second application sends the pending data of described first application.
10. device as claimed in claim 6, it is characterised in that described encryption equipment proxy module is additionally operable to:
After the encryption equipment of the second application sends the pending data of described first application, it may be judged whether arrive Second Preset Time, the most then the encryption equipment to described first application sends the pending of described first application Data;
Otherwise, continue to send the pending number of follow-up described first application to the encryption equipment of described second application According to.
CN201511016898.2A 2015-12-29 2015-12-29 Data processing method and device based on encryption machine Active CN105933271B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511016898.2A CN105933271B (en) 2015-12-29 2015-12-29 Data processing method and device based on encryption machine

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511016898.2A CN105933271B (en) 2015-12-29 2015-12-29 Data processing method and device based on encryption machine

Publications (2)

Publication Number Publication Date
CN105933271A true CN105933271A (en) 2016-09-07
CN105933271B CN105933271B (en) 2020-05-01

Family

ID=56839973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511016898.2A Active CN105933271B (en) 2015-12-29 2015-12-29 Data processing method and device based on encryption machine

Country Status (1)

Country Link
CN (1) CN105933271B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729064A (en) * 2018-05-14 2019-05-07 网联清算有限公司 Encryption equipment fault handling method and information processing system
WO2019218975A1 (en) * 2018-05-14 2019-11-21 网联清算有限公司 Information processing method and information processing system for encryptor
CN110839020A (en) * 2019-10-25 2020-02-25 网联清算有限公司 Security service calling method and security service calling system
CN114025024A (en) * 2021-10-18 2022-02-08 中国银联股份有限公司 Data transmission method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546427A (en) * 2012-07-11 2014-01-29 中国银联股份有限公司 Method and system for realizing high availability of encryption machine application
CN103701583A (en) * 2012-09-28 2014-04-02 中国银联股份有限公司 Encryption processing device and method
CN104539406A (en) * 2014-12-05 2015-04-22 浪潮集团有限公司 Double control network encryptor system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103546427A (en) * 2012-07-11 2014-01-29 中国银联股份有限公司 Method and system for realizing high availability of encryption machine application
CN103701583A (en) * 2012-09-28 2014-04-02 中国银联股份有限公司 Encryption processing device and method
CN104539406A (en) * 2014-12-05 2015-04-22 浪潮集团有限公司 Double control network encryptor system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109729064A (en) * 2018-05-14 2019-05-07 网联清算有限公司 Encryption equipment fault handling method and information processing system
WO2019218975A1 (en) * 2018-05-14 2019-11-21 网联清算有限公司 Information processing method and information processing system for encryptor
CN109729064B (en) * 2018-05-14 2021-04-20 网联清算有限公司 Encryption machine fault processing method and information processing system
US11641350B2 (en) 2018-05-14 2023-05-02 Netsunion Clearing Corporation Information processing method and information processing system for encryption machine
CN110839020A (en) * 2019-10-25 2020-02-25 网联清算有限公司 Security service calling method and security service calling system
CN114025024A (en) * 2021-10-18 2022-02-08 中国银联股份有限公司 Data transmission method and device
CN114025024B (en) * 2021-10-18 2023-07-07 中国银联股份有限公司 Data transmission method and device

Also Published As

Publication number Publication date
CN105933271B (en) 2020-05-01

Similar Documents

Publication Publication Date Title
CN105933271A (en) Data processing method and apparatus based on encoder
CN105099889A (en) Order notification method, apparatus and system
CN102882704B (en) Link protection method in the soft reboot escalation process of a kind of ISSU and equipment
US10764939B2 (en) Network function processing method and related device
CN105939201A (en) Method and device for checking state of server
WO2017107656A1 (en) Virtualized network element failure self-healing method and device
CN107948063B (en) Method for establishing aggregation link and access equipment
CN103795569A (en) Server connection method and device based on connection pool
CN110768840A (en) Control method, device, equipment and storage medium of communication equipment
CN111143031A (en) Method and device for changing capacity of virtual machine
CN104298565A (en) Method and device for initializing ports
WO2017000096A1 (en) Link recovery method and network device
WO2021179841A1 (en) Microservice invoking method and apparatus, device and medium
CN105933270A (en) Cloud encryptor processing method and apparatus
CN111741175B (en) Call center system, signal transmission method, device, server and medium
CN107025126B (en) Resource scheduling method, NFVO and system
CN104539462A (en) Method and device for switching disaster recovery application example
CN103959723A (en) Re-routing method, system and network deivce
CN104869118A (en) Method and system for achieving DDoS defense based on technology of dynamic tunnels
CN115665035A (en) Information processing method and device, first node and storage medium
CN113535402A (en) Load balancing processing method and device based on 5G MEC and electronic equipment
CN106230878A (en) A kind of equipment service calling method based on AllJoyn framework and device
CN109981796B (en) Connection method and device
CN108712782B (en) Tunnel establishment method and device, electronic equipment and readable storage medium
CN106992878B (en) Multicast detection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant